Skip to content

Commit 0f7f06f

Browse files
committed
adding updates as suggestedby CS for SRE access information in Approved Access
fixing link in table for Approved Access updated CS replies updated numbers removed number from CEE row in table
1 parent fc648f9 commit 0f7f06f

File tree

2 files changed

+27
-12
lines changed

2 files changed

+27
-12
lines changed

modules/rosa-red-hat-support-access.adoc

Lines changed: 24 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,20 +14,34 @@ Members of the Red{nbsp}Hat Customer Experience and Engagement (CEE) team typica
1414

1515
| Role | Core namespace | Layered product namespace | Customer namespace | AWS account^*^
1616

17-
|OpenShift SRE| Read: All
17+
|OpenShift SRE - Normal operations ^[1]^| Read: All
1818

1919
Write: Very
2020

21-
limited ^[1]^
21+
limited
2222
| Read: All
2323

2424
Write: None
25-
| Read: None^[2]^
25+
| Read: None
2626

2727
Write: None
28-
|Read: All ^[3]^
28+
|Read: None
29+
30+
Write: None
31+
32+
|OpenShift SRE - Elevated Access ^[2]^ (Gated by link:https://docs.openshift.com/rosa/support/approved-access.html[Approved Access])| Read: All
33+
34+
Write: All
35+
36+
| Read: All
2937

30-
Write: All ^[3]^
38+
Write: All
39+
| Read: All
40+
41+
Write: All
42+
|Read: All
43+
44+
Write: All
3145

3246
|CEE
3347
|Read: All
@@ -38,7 +52,7 @@ Write: None
3852

3953
Write: None
4054

41-
|Read: None^[2]^
55+
|Read: None
4256

4357
Write: None
4458

@@ -72,9 +86,9 @@ Write: None
7286

7387
Write: None
7488

75-
|Read: Limited^[4]^
89+
|Read: Limited ^[3]^
7690

77-
Write: Limited^[4]^
91+
Write: Limited ^[3]^
7892

7993
|Read: None
8094

@@ -97,7 +111,6 @@ Write: None
97111
|===
98112
--
99113
1. Limited to addressing common use cases such as failing deployments, upgrading a cluster, and replacing bad worker nodes.
100-
2. Red{nbsp}Hat associates have no access to customer data by default.
101-
3. SRE access to the AWS account is an emergency procedure for exceptional troubleshooting during a documented incident.
102-
4. Limited to what is granted through RBAC by the Customer Administrator and namespaces created by the user.
114+
2. Elevated access gives SRE the access levels of a cluster-admin role. See link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#default-roles_using-rbac[cluster roles] for more information.
115+
3. Limited to what is granted through RBAC by the Customer Administrator and namespaces created by the user.
103116
--

support/approved-access.adoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,9 @@ endif::[]
99

1010
toc::[]
1111

12-
Red{nbsp}Hat Site Reliability Engineering (SRE) typically does not require an elevated access to systems as part of normal operations to manage and support {product-title} clusters. In the unlikely event that SRE needs elevated access to systems, you can use the _Approved Access_ interface to review and _approve_ or _deny_ access to these systems.
12+
Red{nbsp}Hat Site Reliability Engineering (SRE) typically does not require elevated access to systems as part of normal operations to manage and support {product-title} clusters. Elevated access gives SRE the access levels of a cluster-admin role. See link:https://docs.openshift.com/container-platform/4.17/authentication/using-rbac.html#default-roles_using-rbac[cluster roles] for more information.
13+
14+
In the unlikely event that SRE needs elevated access to systems, you can use the _Approved Access_ interface to review and _approve_ or _deny_ access to these systems.
1315

1416
Elevated access requests to clusters on {product-rosa} clusters and the corresponding cloud accounts can be created by SRE either in response to a customer-initiated support ticket or in response to alerts received by SRE as part of the standard incident response process.
1517

0 commit comments

Comments
 (0)